Author Archives: Swascan

Digital4Her: Swascan will attend the event by the European Commission

Digital4Her – Bruxelles Swascan is pleased to announce its attendance to the pitching session “Startup worth growing” as part of the Digital Single Market Digital4Her event. We are glad to attend such a prestigious event that will take place in Bruxelles. This invitatation to the women-only Digital4Her event testifies how hard Swascan is focusing its efforts on the right Read more »

CyberSecurity for SMBs: an issue to face as soon as possible

Cybersecurity for SMBs CyberSecurity for SMBs is a growing and growing need because enterprises are no longer the only target of hackers. However, hackers succeed in their attacks both because of: their skills; the lack of knowledge of the employees. As we briefly mentioned before SMBs need to implement their CyberSecurity measures because companies are one of the Read more »

Data processing: introduction and explanation

Data processing: definition The fourth article of the new European legislation ( GDPR ) describes data processing as follows: “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, Read more »

Data controller: explanation of the figure and duties

Data Controller According to what the new Data Protection European Regulation ( GDPR ) states, the data controller – described in article 4 – is: “the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the Read more »

CyberSecurity trends: what is going to happen in 2018?

Top 5 CyberSecurity trends for 2018 CyberSecurity trends: 2018 will surely be an interesting year as far as Cybersecurity is concerned. We already witnessed some big incidents, including data breaches and tumultuous developments regarding cryptocurrencies that led Governments of a lot of countries to issue official directives and implement actions in these directions. CyberSecurity trends: IoT & CyberSecurity threats We should Read more »

OWASP Top 10: which are the main threats?

OWASP Top 10 The Open Web Application Security Project or OWASP , as we said in a previous article, is a not-for-profit organisation that aims at providing ‘best-in-class’ application security solutions. Their advices and tools are free, vendor neutral, unbiased yet practical. The organisation also lists the OWASP Top 10 web application security risks to help developers and system Read more »

Portability of the data: one of the rights introduced by the GDPR

Portability of the data: one of the rights The new General Data Protection Regulation (GDPR), other than data portability, confirms several rights of the data subject. Data subjects have the: Right to be informed; Right of access; Right to rectification; Right to restriction of processing; Right to erasure (right to be forgotten); Right to object; Rights related to automated individual decision-making, including profiling; Last but not least, Read more »

Source code: definition and introduction

Source code: what is it? Source code can be called source as well as code and it is the original version of a software. Basically, the way software has been written and typed into the laptop in the first place. That is the reason of its being in plain text. What do we mean when we refer to softwares? Read more »

OWASP: Open Web Application Security Project

OWASP The Open Web Application Security Project or OWASP is a foundation that came into being on December 1, 2001. Basically, this foundation has a specific goal: improving software security. This not-for-profit organisation aims to provide unbiased, practical solutions to governments, organisations, educational institutes, trade organisations, groups, development organisations etc. OWASP offer tools and documents that have been Read more »

Cross site scripting: what do you need to know about it?

Cross site scripting Cross Site Scripting or XSS is a particular form of injection attack. Basically, attackers inject malicious scripts into a website. The attackers typically use web applications to transmit malicious codes, usually browser side scripts, to a different end user. In return, the web applications in a system generate output in response to the malicious input Read more »